Teleport Server Access
SSH securely into Linux servers and smart devices with a complete audit trail
Teleport Kubernetes Access
Access Kubernetes clusters securely with complete visibility to access and behavior
Teleport Application Access
Access web applications running behind NAT and firewalls with security and compliance
Teleport Database Access
For PostgreSQL and MySQL databases behind NAT in multiple environments
Teleport Desktop Access
Securely access Windows servers and desktops in multiple environments.
An overview of Teleport Access Plane features, capabilities and more...
Teleport Use Cases
Learn how Financial Services companies use Teleport
Software-as-a-service (SaaS) Providers
Learn how SaaS providers use Teleport
E-commerce & Entertainment
Learn how E-commerce & Entertainment companies use Teleport
Infrastructure Access for AWS
Easily control who can provision and access your critical AWS resources
Privileged Access Management
Secure your critical infrastructure without slowing developers down
Machine ID delivers automated, identity-based access for your services
Teleport Connect improves UX and identity-based access for the cloud
Installation and Teleport user guides
How it Works
Learn the fundamentals of how Teleport works
Ask us a setup question, post your tutorial, feedback or idea on our forum
Teleport Slack Channel
Need help with set-up? Ping us in Slack channel
View the open source repository on Github
Learn more about teleport
Technical articles, news, and product announcements
Learn how companies use Teleport to secure their environments
A collection of whitepapers, webinars, demos, and more...
View our upcoming events
What is SSH?
Learn the basics of SSH and how it's used to Access Infrastructure
Our missions and vision for the future
View our available career opportunities
Featured publication from around the web
Sign in to Teleport
Teleport Cloud Login
Login to your Teleport Account
Legacy Login & Teleport Enterprise Downloads
Article & News
Articles by topic bastion
Mar 10, 2022
By Janakiram MSV
How to Set-up an Identity-Aware Access Proxy as a Bastion Host in AWS
This post explains how to set-up AWS bastion host based on Teleport identity-aware access proxy.
Jan 13, 2022
By Sakshyam Shah
SSH Bastion Host Best Practices
Learn 14 best practices to build and deploy a security-hardened SSH bastion host based on OpenSSH server.
Sep 22, 2021
By Sakshyam Shah
Do We Still Need a Bastion?
Cloud, serverless, immutable infrastructure, Kubernetes - Where do bastions fit in these scenarios? Do we even need one?
Articles by topic